Sciweavers

3972 search results - page 194 / 795
» Design of the iSCSI Protocol
Sort
View
145
Voted
ICC
2007
IEEE
206views Communications» more  ICC 2007»
15 years 11 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
174
Voted
WIMOB
2007
IEEE
15 years 10 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
DCOSS
2007
Springer
15 years 10 months ago
An Adaptive Scheduling Protocol for Multi-scale Sensor Network Architecture
In self-organizing networks of battery-powered wireless sensors that can sense, process, and communicate, energy is the most crucial and scarce resource. However, since sensor netw...
Santashil PalChaudhuri, David B. Johnson
146
Voted
APWEB
2005
Springer
15 years 10 months ago
An Updates Dissemination Protocol for Read-Only Transaction Processing in Mobile Real-Time Computing Environments
Data management issues in mobile computing environments have got lots of concerns of relevant researchers. Among these research topics, data broadcast has been extensively investig...
Guohui Li, Hongya Wang, Jixiong Chen, Yingyuan Xia...
DCOSS
2005
Springer
15 years 10 months ago
Analysis of Gradient-Based Routing Protocols in Sensor Networks
Abstract. Every physical event results in a natural information gradient in the proximity of the phenomenon. Moreover, many physical phenomena follow the diffusion laws. This natu...
Jabed Faruque, Konstantinos Psounis, Ahmed Helmy